Proactive Eavesdropping via Jamming in Full-Duplex Multi-Antenna Systems: Beamforming Design and Antenna Selection

This paper investigates the application of full-duplex (FD) multi-antenna transceivers in proactive eavesdropping systems. To this end, we jointly optimize the transmit and receive beamformers at the legitimate FD monitor to maximize the eavesdropping non-outage probability of the system. The resulting non-convex problem is solved using two-layer decomposition technique. The inner layer problem is formulated as a semidefinite relaxation problem, and the outer problem is solved by one-dimensional line search. We further propose sub-optimum beamforming designs, where the beamformers are obtained using zero-forcing, and maximum ratio transmission. To archive a low-complexity implementation, we study the antenna selection problem as an alternative for performance optimization. Particularly, based on the system’s eavesdropping non-outage probability, several antenna selection schemes are proposed to choose single transmit and single receive antenna at the FD monitor. For each scheme, we derive closed-form expressions of the eavesdropping non-outage probability. Our findings reveal that proposed antenna selection schemes can achieve the performance close to that of the proposed optimum/sub-optimum beamforming design, but with much lower implementation complexity.

[1]  Chintha Tellambura,et al.  Uplink/Downlink Rate Analysis and Impact of Power Allocation for Full-Duplex Cloud-RANs , 2018, IEEE Transactions on Wireless Communications.

[2]  Rui Zhang,et al.  Wireless Information Surveillance via Proactive Eavesdropping with Spoofing Relay , 2016, IEEE Journal of Selected Topics in Signal Processing.

[3]  Mehdi Bennis,et al.  Performance of Transmit Antenna Selection Physical Layer Security Schemes , 2012, IEEE Signal Processing Letters.

[4]  Zhi-Quan Luo,et al.  Semidefinite Relaxation of Quadratic Optimization Problems , 2010, IEEE Signal Processing Magazine.

[5]  Chau Yuen,et al.  Low-Complexity End-to-End Performance Optimization in MIMO Full-Duplex Relay Systems , 2013, IEEE Transactions on Wireless Communications.

[6]  W. Marsden I and J , 2012 .

[7]  Jiayin Qin,et al.  Proactive Monitoring via Passive Reflection Using Intelligent Reflecting Surface , 2020, IEEE Communications Letters.

[8]  Rui Zhang,et al.  Jamming-Assisted Proactive Eavesdropping Over Two Suspicious Communication Links , 2019, IEEE Transactions on Wireless Communications.

[9]  Caijun Zhong,et al.  Proactive Eavesdropping in Relaying Systems , 2017, IEEE Signal Processing Letters.

[10]  Baoyun Wang,et al.  Proactive Eavesdropping in UAV-Aided Suspicious Communication Systems , 2019, IEEE Transactions on Vehicular Technology.

[11]  Quanzhong Li,et al.  Robust Proactive Monitoring via Jamming With Deterministically Bounded Channel Errors , 2018, IEEE Signal Processing Letters.

[12]  Jie Xu,et al.  Surveillance and Intervention of Infrastructure-Free Mobile Communications: A New Wireless Security Paradigm , 2016, IEEE Wireless Communications.

[13]  Ding Xu,et al.  Legitimate Surveillance of Suspicious Communications With QoS Guarantees for Unsuspicious Users , 2020, IEEE Communications Letters.

[14]  Zhiguo Ding,et al.  Proactive Eavesdropping Using UAV Systems with Full-Duplex Ground Terminals , 2018, 2018 IEEE International Conference on Communications Workshops (ICC Workshops).

[15]  Hongbo Zhu,et al.  Jammer-Assisted Legitimate Eavesdropping in Wireless Powered Suspicious Communication Networks , 2019, IEEE Access.

[16]  Chintha Tellambura,et al.  Wireless-Powered Full-Duplex Relay and Friendly Jamming for Secure Cooperative Communications , 2019, IEEE Transactions on Information Forensics and Security.

[17]  George K. Karagiannidis,et al.  On Secrecy Performance of Antenna-Selection-Aided MIMO Systems Against Eavesdropping , 2015, IEEE Transactions on Vehicular Technology.

[18]  Inkyu Lee,et al.  Relay-Assisted Proactive Eavesdropping With Cooperative Jamming and Spoofing , 2018, IEEE Transactions on Wireless Communications.

[19]  MohammadAli Mohammadi,et al.  Proactive Eavesdropping via Jamming in Full-duplex Cellular Networks with Antenna Selection , 2018, 2018 9th International Symposium on Telecommunications (IST).

[20]  Neil Genzlinger A. and Q , 2006 .

[21]  Caijun Zhong,et al.  Throughput Analysis and Optimization of Wireless-Powered Multiple Antenna Full-Duplex Relay Systems , 2016, IEEE Transactions on Communications.

[22]  G.Neelima Usha Rani Jaggu MULTI-ANTENNA WIRELESS LEGITIMATE SURVEILLANCE SYSTEMS: DESIGN AND PERFORMANCE ANALYSIS , 2019 .

[23]  Jeffrey G. Andrews,et al.  Mode Switching for the Multi-Antenna Broadcast Channel Based on Delay and Channel Quantization , 2008, EURASIP J. Adv. Signal Process..

[24]  Daniel Pérez Palomar,et al.  Fractional QCQP With Applications in ML Steering Direction Estimation for Radar Detection , 2011, IEEE Transactions on Signal Processing.

[25]  Gábor Pataki,et al.  On the Rank of Extreme Matrices in Semidefinite Programs and the Multiplicity of Optimal Eigenvalues , 1998, Math. Oper. Res..

[26]  Jie Xu,et al.  Proactive Eavesdropping Via Jamming for Rate Maximization Over Rayleigh Fading Channels , 2015, IEEE Wireless Communications Letters.

[27]  Jie Xu,et al.  Proactive Eavesdropping via Cognitive Jamming in Fading Channels , 2015, IEEE Transactions on Wireless Communications.

[28]  Qi Zhang,et al.  Proactive Monitoring via Jamming in Amplify-and-Forward Relay Networks , 2017, IEEE Signal Processing Letters.

[29]  Stéphane Y. Le Goff,et al.  Secrecy Rate Optimizations for a MIMO Secrecy Channel With a Cooperative Jammer , 2015, IEEE Transactions on Vehicular Technology.

[30]  Inkyu Lee,et al.  Beamforming and Power Splitting Designs for AN-Aided Secure Multi-User MIMO SWIPT Systems , 2017, IEEE Transactions on Information Forensics and Security.

[31]  Yang-Seok Choi,et al.  Full-Duplex Mobile Device - Pushing The Limits , 2014, ArXiv.

[32]  Björn E. Ottersten,et al.  Improving Physical Layer Secrecy Using Full-Duplex Jamming Receivers , 2013, IEEE Transactions on Signal Processing.

[33]  A.F. Molisch,et al.  MIMO systems with antenna selection , 2004, IEEE Microwave Magazine.

[34]  Zhiguo Ding,et al.  Antenna Selection in Full-Duplex Cooperative NOMA Systems , 2018, 2018 IEEE International Conference on Communications (ICC).

[35]  Taneli Riihonen,et al.  Mitigation of Loopback Self-Interference in Full-Duplex MIMO Relays , 2011, IEEE Transactions on Signal Processing.

[36]  Geoffrey Ye Li,et al.  Joint Beamforming and Jamming Design for mmWave Information Surveillance Systems , 2018, IEEE Journal on Selected Areas in Communications.

[37]  Sachin Katti,et al.  Full Duplex MIMO Radios , 2014, NSDI.

[38]  Joseph Lipka,et al.  A Table of Integrals , 2010 .

[39]  Caijun Zhong,et al.  Multi-Antenna Wireless Legitimate Surveillance Systems: Design and Performance Analysis , 2017, IEEE Transactions on Wireless Communications.

[40]  Charles R. Johnson,et al.  Matrix analysis , 1985, Statistical Inference for Engineers and Data Scientists.

[41]  Daniel Pérez Palomar,et al.  Rank-Constrained Separable Semidefinite Programming With Applications to Optimal Beamforming , 2010, IEEE Transactions on Signal Processing.

[42]  Qi Zhang,et al.  Proactive Monitoring Via Jamming for Rate Maximization Over MIMO Rayleigh Fading Channels , 2017, IEEE Communications Letters.

[43]  A. Lee Swindlehurst,et al.  Robust Beamforming for Security in MIMO Wiretap Channels With Imperfect CSI , 2010, IEEE Transactions on Signal Processing.

[44]  Rohit Negi,et al.  Guaranteeing Secrecy using Artificial Noise , 2008, IEEE Transactions on Wireless Communications.